Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2024 02:18

General

  • Target

    c21680ada0e8878db8b8fb6aee3d99c2_JaffaCakes118.exe

  • Size

    151KB

  • MD5

    c21680ada0e8878db8b8fb6aee3d99c2

  • SHA1

    1818a734ff9fb6e4f7dde3f35da6d44e0500fb25

  • SHA256

    0ae983a91c8cfcb2092ee641c98baff1703dca0d54f9c2939f133abcefd10543

  • SHA512

    c50048de88f9cd02dbb918538d70510ac8b609d9575e314c5b2eb4d34d78b88d8c8bcd33c9ba15a9e77668d8fd351ec2fa538a041c52dcd02932a79798a24a4a

  • SSDEEP

    1536:N0CECskcEsThdddgePFrJvWn2SnqV4B7DQ4sJNdUQwqn4+g2PSlTCUzweVkM1ufH:uCpcE+j1vWn2BMCrDjn4+g9T5zwOufv

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 10 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c21680ada0e8878db8b8fb6aee3d99c2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c21680ada0e8878db8b8fb6aee3d99c2_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    PID:1672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    06ba00fa01199156c587b5463db9bf2b

    SHA1

    d332a4708ba49e1a3e15a318f8c6ddd947be0488

    SHA256

    aae63aeddd9432db8e8811c8c8f45d8724e3cfde6019979978086794f41405ca

    SHA512

    15a2a939d74f8d43a1022ea950d96c8cd1531cb632e59db9c62dc5a3d1fa35d86d79691fb95e715a54500d65e2c224507fd12f4d2a1dedfce6db917ecdf46595

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7eb438a27c4947993793700419d62325

    SHA1

    c45b0dda7ef23e0dfce0dcf36a880284dd5eb280

    SHA256

    34a1e44b0b2820e601623563ca27d164bedcfd2aac621b68aa75cc9b8b8ec7c3

    SHA512

    87229120077219a72a577450e57c298ef0fc023dab0bb146a304eab8c8dc65756439600dc77aff664a79fe6b0d5813db3b43a0fe23ac0a15e692c2852cf7ba7f

  • C:\Users\Admin\AppData\Local\Temp\Cab8D90.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8E50.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1672-92-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1672-0-0x0000000000230000-0x000000000025C000-memory.dmp

    Filesize

    176KB

  • memory/1672-86-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1672-91-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1672-1-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1672-93-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1672-94-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1672-95-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1672-96-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1672-97-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1672-98-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1672-99-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB